Ñòóäîïåäèÿ  
Ãëàâíàÿ ñòðàíèöà | Êîíòàêòû | Ñëó÷àéíàÿ ñòðàíèöà

ÀâòîìîáèëèÀñòðîíîìèÿÁèîëîãèÿÃåîãðàôèÿÄîì è ñàäÄðóãèå ÿçûêèÄðóãîåÈíôîðìàòèêà
ÈñòîðèÿÊóëüòóðàËèòåðàòóðàËîãèêàÌàòåìàòèêàÌåäèöèíàÌåòàëëóðãèÿÌåõàíèêà
ÎáðàçîâàíèåÎõðàíà òðóäàÏåäàãîãèêàÏîëèòèêàÏðàâîÏñèõîëîãèÿÐåëèãèÿÐèòîðèêà
ÑîöèîëîãèÿÑïîðòÑòðîèòåëüñòâîÒåõíîëîãèÿÒóðèçìÔèçèêàÔèëîñîôèÿÔèíàíñû
Õèìèÿ×åð÷åíèåÝêîëîãèÿÝêîíîìèêàÝëåêòðîíèêà

IX. Say in one word (see the words below)

×èòàéòå òàêæå:
  1. A FEW WORDS ABOUT OPERATING A BUSINESS
  2. A look through the descriptions of things you can do with music and try to guess the meaning of the words in bold type.
  3. A. Listen to the description of the drilling process and fill in the missing words (no more than THREE words). The first word is given as an example.
  4. A. Read the paragraph below and choose the most appropriate words/ phrases in bold. Where could you read this extract?
  5. Abstract and Keywords
  6. Abstract and Keywords
  7. Abstract and Keywords
  8. Abstract and Keywords
  9. Abstract and Keywords
  10. Abstract and Keywords
  1. extremely important and necessary
  2. a person entering somewhere by force, illegally with the purpose to commit a crime, especially theft
  3. something that you can choose to do
  4. a condition or circumstance that puts one in a better position
  5. make something unclear, ununderstandable
  6. not controlled by or directly connected to a computer or the Internet
  7. a special memory of the computer relating to a special object, for example virus
  8. absolutely necessary or essential for life
  9. a location connected to the Internet that maintains one or more pages on the World Wide Web
  10. a person or company that produces or manufactures something
  11. a machine or the part of the computer which is used to examine, identify, monitor or record things

  1. advantage
  2. burglar
  3. critical
  4. maker
  5. obfuscate
  6. offline
  7. option
  8. scanner
  9. “signature”
  10. vital
  11. web-site

 

Give English equivalents

çàøèôðîâàííûå äàííûå, óñòàíîâèòü ñàìûé áåçîïàñíûé çàìîê, âõîäíàÿ äâåðü, ðåøàþùèé ôàêòîð, íåíàä¸æíûé ñïîñîá, õðàíèòü êëþ÷, ïðåèìóùåñòâî ìåòîäà, çà ñ÷¸ò áåçîïàñíîñòè, ñêðûâàòü êëþ÷, õîðîøî ñïðÿòàí, ìîæåò áûòü îáíàðóæåí, îòäåëüíîå õðàíåíèå, äèñêåòà, ðåçåðâíàÿ êîïèÿ, ñèþ ìèíóòó, óñòàðåâøåå àíòèâèðóñíîå ïðèëîæåíèå, îòäåëüíûé âèðóñ, ïîñëåäíèå âåðñèè ôàéëîâ ñèãíàòóð, íàèáîëüøèé óùåðá, êàê òîëüêî ñâåäåíèÿ ðàñïðîñòðàíÿþòñÿ, òåìïû ðàñïðîñòðàíåíèÿ âèðóñà ñíèæàþòñÿ, áåñïëàòíî çàãðóæàòü ïîñëåäíèå âåðñèè ôàéëîâ ñèãíàòóð ñî ñâîèõ âåá-óçëîâ, ðàññûëàòü óâåäîìëåíèÿ, ñîçäàòåëè âèðóñîâ

Keys

Ex. V


1 – b

2 – d

3 – m

4 – h

5 – g

6 – c

7 – f

8 – l

9 – a

10 – e

11 – o

12 – t

13 – q

14 – r

15 – k

16 – n

17 – p

18 – i

19 – s

20 – j


Ex. VIII


1 – f

2 – g

3 – l

4 – d

5 – i

6 – o

7 – j

8 – b

9 – c

10 – k

11 – n

12 – e

13 – h

14 – a

15 – m


Ex. IX


1 – c

2 – b

3 – g

4 – a

5 – e

6 – f

7 – i

8 – j

9 – k

10 – d

11 – h


 

 

UNIT 16 – LAWS 9, 10

Law #9: Absolute anonymity isn’t practical, in real life or on the Web

All human interaction involves exchanging data of some kind. If someone weaves enough of that data together, they can identify you. Think about all the information that a person can glean in just a short conversation with you. In one glance, they can gauge your height, weight, and approximate age. Your accent will probably tell them what country you’re from, and may even tell them what region of the country. If you talk about anything other than the weather, you’ll probably tell them something about your family, your interests, where you live, and what you do for a living. It doesn’t take long for someone to collect enough information to figure out who you are. If you crave absolute anonymity, your best bet is to live in a cave and shun all human contact.

The same thing is true of the Internet. If you visit a website, the owner can, if he’s sufficiently motivated, find out who you are. After all, the ones and zeroes that make up the Web session have to be able to find their way to the right place, and that place is your computer. There are a lot of measures you can take to disguise the bits, and the more of them you use, the more thoroughly the bits will be disguised. For instance, you could use network address translation to mask your actual IP address, subscribe to an anonymizing service that launders the bits by relaying them from one end of the ether to the other, use a different ISP account for different purposes, surf certain sites only from public kiosks, and so on. All of these make it more difficult to determine who you are, but none of them make it impossible. Do you know for certain who operates the anonymizing service? Maybe it’s the same person who owns the website you just visited! Or what about that innocuous website you visited yesterday, that offered to mail you a free $10 off coupon? Maybe the owner is willing to share information with other website owners. If so, the second website owner may be able to collate the information from the two sites and determine who you are.

Does this mean that privacy on the Web is a lost cause? Not at all. What it means is that the best way to protect your privacy on the Internet is the same as the way you protect your privacy in normal life – through your behavior. Read the privacy statements on the websites you visit, and only do business with ones whose practices you agree with. If you’re worried about cookies, disable them. Most importantly, avoid indiscriminate Web surfing – recognize that just as most cities have a bad side of town that’s best avoided, the Internet does too. But if it’s complete and total anonymity you want, better start looking for that cave.

 

Law #10: Technology is not a panacea

Technology can do some amazing things. Recent years have seen the development of ever-cheaper and more powerful hardware, software that harnesses the hardware to open new vistas for computer users, as well as advancements in cryptography and other sciences. It’s tempting to believe that technology can deliver a risk-free world, if we just work hard enough. However, this is simply not realistic.

Perfect security requires a level of perfection that simply doesn’t exist, and in fact isn’t likely to ever exist. This is true for software as well as virtually all fields of human interest. Software development is an imperfect science, and all software has bugs. Some of them can be exploited to cause security breaches. That’s just a fact of life. But even if software could be made perfect, it wouldn’t solve the problem entirely. Most attacks involve, to one degree or another, some manipulation of human nature – this is usually referred to as social engineering. Raise the cost and difficulty of attacking security technology, and bad guys will respond by shifting their focus away from the technology and toward the human being at the console. It’s vital that you understand your role in maintaining solid security, or you could become the chink in your own system’s armor.

The solution is to recognize two essential points. First, security consists of both technology and policy – that is, it’s the combination of the technology and how it’s used that ultimately determines how secure your systems are. Second, security is journey, not a destination – it isn’t a problem that can be “solved” once and for all; it’s a constant series of moves and countermoves between the good guys and the bad guys. The key is to ensure that you have good security awareness and exercise sound judgment. There are resources available to help you do this. The Microsoft Security website, for instance, has hundreds of white papers, best practices guides, checklists and tools, and we’re developing more all the time. Combine great technology with sound judgment, and you’ll have rock-solid security.




Äàòà äîáàâëåíèÿ: 2015-09-10; ïðîñìîòðîâ: 19 | Ïîìîæåì íàïèñàòü âàøó ðàáîòó | Íàðóøåíèå àâòîðñêèõ ïðàâ

IX. Say in one word (see the words below) | Exercises | VII. Insert the proper words (see the words below) | Ex. VIII | X. Give English equivalents | X. Give English equivalents | X. Give English equivalents | Ex. VII | X. Give English equivalents | VIII. Insert the proper words (see the words below) |


lektsii.net - Ëåêöèè.Íåò - 2014-2024 ãîä. (0.01 ñåê.) Âñå ìàòåðèàëû ïðåäñòàâëåííûå íà ñàéòå èñêëþ÷èòåëüíî ñ öåëüþ îçíàêîìëåíèÿ ÷èòàòåëÿìè è íå ïðåñëåäóþò êîììåð÷åñêèõ öåëåé èëè íàðóøåíèå àâòîðñêèõ ïðàâ